Recently on Lawfare

Cybersecurity

Rediscovering Vulnerabilities

Software and computer systems are a standard target of intelligence collection in an age where everything from your phone to your sneakers has been turned into a connected computing device. A modern government intelligence organization must maintain access to some software vulnerabilities into order to target these devices. However, the WannaCry ransomware and NotPetya attacks have called attention to the perennial flipside of this issue—the same vulnerabilities that the U.S. government uses to conduct this targeting can also be exploited by malicious actors if they go unpatched.

Privacy Paradox

The US-UK Deal Is Actually Quite Good

The US-UK law enforcement data exchange Agreement (should it ever be authorized by Congress) would be a positive step in regularizing the process of cross border data exchange and preventing the balkanization of the network.  Fears that it is overbroad, that UK judges lack independence, or that the UK's law enforcement powers are not subject to review are themselves mistaken and a bit overblown.  They also lack a due regard for the integrity of the UK democratic process.

Espionage

Could Trump Jr., Kushner, or Manafort Be Charged Under the Espionage Act?

[email protected], Michel Paradis assesses whether members of Donald Trump's inner circle could be prosecuted under the Espionage Act for a meeting with Russians.

Subscribe to Lawfare

EmailRSSKindle